Application Security , Blockchain & Cryptocurrency , Cybercrime

Analysis: Hijacking of Twitter Hacker's Virtual Hearing

Also: The Network Segmentation Imperative; Windows Print Spooler Problems
Analysis: Hijacking of Twitter Hacker's Virtual Hearing

The latest edition of the ISMG Security Report analyzes the hijacking of a virtual court hearing in the Twitter hacking case.

In this report, you'll hear (click on player beneath image to listen):

  • ISMG's Jeremy Kirk describe how intruders were able to disrupt the virtual hearing for a suspected Twitter hacker;
  • Former Deputy Director of U.K.'s National Cyber Security Center, Peter Yapp, discuss the importance of network segmentation;
  • ISMG's Jeremy Kirk provide an update on vulnerabilities in Windows print spooler that linger a decade after they were exploited by Stuxnet.

The ISMG Security Report appears on this and other ISMG websites on Fridays. Don't miss the July 24 and July 31 editions, which respectively discuss the celebrity Twitter hack and the hacking of the mobile banking app Dave.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.